US20170046932A1 - Methods, devices, kits and systems for modulating activation of self-alarming tags - Google Patents

Methods, devices, kits and systems for modulating activation of self-alarming tags Download PDF

Info

Publication number
US20170046932A1
US20170046932A1 US15/306,407 US201515306407A US2017046932A1 US 20170046932 A1 US20170046932 A1 US 20170046932A1 US 201515306407 A US201515306407 A US 201515306407A US 2017046932 A1 US2017046932 A1 US 2017046932A1
Authority
US
United States
Prior art keywords
self
tag
article
alarming
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/306,407
Other versions
US9947194B2 (en
Inventor
Giovanni Salvo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US15/306,407 priority Critical patent/US9947194B2/en
Publication of US20170046932A1 publication Critical patent/US20170046932A1/en
Application granted granted Critical
Publication of US9947194B2 publication Critical patent/US9947194B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • H04B5/72
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/246Check out systems combined with EAS, e.g. price information stored on EAS tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06018Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • H04B5/77
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution

Definitions

  • the present disclosure generally relates to security tags. More particularly, but not exclusively, the present disclosure relates to methods, devices, kits and systems for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a system for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a device for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a kit for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a method for modulating activation of self-alarming tags.
  • a system for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles comprising: at least one database comprising information on whether a given one or more of the plurality of articles has been purchased or not; at least one input/output interface in communication with at least one of the plurality of self-alarming tags for transmitting a deactivation signal to the given one given self-alarming tag for deactivation thereof upon the request of a user; at least one processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the given self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the given one self-alarming tag if the article linked therewith has not been purchased.
  • the at least one processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • a system for modulating the activation of a plurality of anti-theft self-alarming tag mounted to respective articles, each self-alarming tag signaling an alarm indicative of an unauthorized distance between each tag and the respective article it is mounted to comprising: at least one database comprising information on whether a given one or more of the plurality of articles has been purchased or not; at least one input/output interface in wireless radiofrequency communication with at least one of the plurality of self-alarming tags for transmitting a deactivation signal to the given one given self-alarming tag for deactivation thereof upon the request of a user; at least one processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the given self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the
  • At least one the plurality of the tags is selected from the group consisting of an RFID tag, an RFID-EPC tag, an EAS tag, a smart label, an intelligent bar code and any combination thereof.
  • system further comprises a purchase interface for effectuating purchase of the article.
  • the system further comprises a device for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, wherein the device comprises a element selected from the group consisting of the input/output interface, the processor, the database, the purchase interface and any combination thereof.
  • the device comprises a handheld unit.
  • the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
  • the system further comprises additional monitoring devices at predetermined regions within a purchasing area, in an embodiment, the additional monitoring devices are selected from the group consisting of: image capture devices, sensors, cameras, GPS devices, RFID devices and any combination thereof.
  • system further comprises a plurality of processors and a master processor in communication with the plurality of processors for receiving activity information therefrom, the master processor configured to analyze the activity information.
  • a device for modulating the activation of an anti-theft self-alarming tag linked to an article comprising: a database comprising information on whether the article has been purchased or not; an input/output interface In communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • the processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • a device for modulating the activation of an anti-theft self-alarming tag mounted to an article, the self-alarming tag signaling an alarm indicative of an unauthorized distance between the tag and the article comprising: a database comprising information on whether the article has been purchased or not; an input/output interface in wireless radiofrequency communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased, wherein the processor comprises a set of additional conditions for allowing the input
  • the device further comprises a purchase interface for effectuating purchase of the article.
  • the device comprises a handheld unit.
  • the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
  • a kit for retail theft prevention comprising at least one self-alarming tag for being linked to an article for signaling an alarm in the case of attempted theft of the article; a database comprising information on whether the article has been purchased or not; at least one input/output interface in communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • the processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • a kit for retail theft prevention comprising: at least one self-alarming tag for being mounted to an article for signaling an alarm in the case of attempted theft of the article, the self-alarming tag signaling an alarm indicative of an unauthorized distance between the tag and the article; a database comprising information on whether the article has been purchased or not: at least one input/output interface In wireless radiofrequency communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased, and wherein the processor
  • the kit further comprises a purchase interface for effectuating purchase of the article
  • the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
  • a method for modulating the activation of a plurality of anti-theft self-alarming tags mounted to respective articles each self-alarming tag signaling an alarm indicative of an unauthorized distance between each tag and the respective article it is mounted to comprising: remotely storing in real time information on whether the article has been purchased or not; remotely transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user, remotely allowing the transmission of the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and remotely allowing the transmission of the deactivation signal to the self-alarming tag based on a set of additional conditions selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the
  • a method for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles comprising: remotely storing in real time information on whether the article has been purchased or not; remotely transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; remotely allowing the transmission of the deactivation signal to the self-alarming tag if the article linked therewith has been purchased; and remotely preventing the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • the method further comprises allowing the transmission of the deactivation signal to the self-alarming tag based on a set of additional conditions selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • a set of additional conditions selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • an internal control system which deters employees from stealing merchandise from their own employers.
  • package or “packaging” also includes without limitation whatsoever to the broad definition thereof a box of any type of configuration or any other type of full or partial enclosure for housing, enclosing or otherwise mounting an item therein or thereto as is known in the art made by any type of material.
  • article(s) also includes package, packages, and items depending on the use of a particular device, or assembly of devices disclosed herein.
  • FIG. 1 is a schematic representation of a system of for modulating activation of security tags in accordance with a non-restrictive illustrative embodiment of the present disclosure.
  • FIG. 2 is a perspective view of a handheld device for modulating activation of security tags in accordance with a non-restrictive illustrative embodiment of the present disclosure.
  • a processor is in communication the input/output interface for control thereof.
  • the processor is in communication with a database comprising information on whether the article has been purchased or not for receiving purchase information therefrom.
  • the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased
  • FIG. 1 shows a system 10 in accordance with an illustrative embodiment of the present disclosure.
  • the system 10 includes a self-alarming tag 12 (RFID, EAS tag, smart labels, intelligent bar codes etc.) in communication with an article 14 (item, product package, etc.).
  • RFID self-alarming tag
  • the article 14 cannot be removed from an authorized delimited area (store, checkout area etc.) unless the tag 12 is deactivated otherwise, if the article 14 is removed from the authorized delimited area, the activated tag 12 will trigger an alarm.
  • the tag 12 can also trigger an alarm when it is removed prior to be being deactivated.
  • the tags of the present disclosure comprise the various devices discussed in PCT/CA2012/000509 and in PCT/CA2014/000124 which are incorporated herein by reference in their entirety.
  • An input/output interface device 16 is in communication with the tag 12 for deactivating the tag 12 subsequent to purchase so as not to trigger an alarm when the customer leaves the authorized delimited area with the purchased article 14 or when the employee at the point of sale (such as the checkout), for example, removes the tag 12 from the purchased article 14 .
  • the interface device 16 is in communication with a processor 18 .
  • the processor 18 controls the interface device 16 in deactivating the tag 12 .
  • processor includes without limitation a processing unit, a computing device, an integrated circuit, a central processing unit, a microprocessor, and the like and comprises an associated memory with an instruction set specific to its application.
  • the processor 18 is configured to identify the tag 12 and verify whether or not the article 14 to which the tag 12 is linked has been purchased.
  • the processor 18 is thus in communication with a database 20 which receives purchasing Information via a purchasing or purchase interface 21 such a cash register, a checkout, a self-checkout (self-service checkout, or a semi attended customer activated terminal) or point of sale device as is known in the art.
  • the processor 18 verifies If the given article 14 on which the given tag 12 is linked to has been purchased (in accordance with the information in the database 20 ). If this pre-condition is met and the article 14 has indeed been purchased, then the processor 18 will allow the deactivation signal to be transmitted to the tag 12 thereby deactivating the tag 12 . Alternatively, if the processor 18 determines that the pre-condition of the article having been purchased has not been met, then the processor 18 will prevent for the deactivation signal to be transmitted to the tag 12 and thus the tag 12 will remain active so as to signal the alarm as discussed hereinabove.
  • the point of sale devices include various other forms of personalized shopping devices and methods (e.g. IPayTM) through smart phones or tablets (e.g. iPadTM) or the like, where shoppers can purchase an item through their own personal device (i.e. the purchase interface 21 ).
  • IPayTM personalized shopping devices and methods
  • smart phones or tablets e.g. iPadTM
  • tablets e.g. iPadTM
  • the purchase interface 21 e.g. the purchase interface 22 .
  • the shopper walks through the store chooses an article and merely purchases the article on site via their personal purchase interface 21 , As they proceed to exit the store, the tag 12 is read by an exit security reader which comprises the input/output interface 16 . Walking through this exit security reader (comprising the input/output interface 16 ) is in essence a request to the input/output interface device 16 to deactivate the tag 12 , this request is communicated to the processor 18 . Therefore, proceeding to exit the premises via the exit security reader is akin to a user actuating a deactivation command (as explained above). As before, the processor 18 verifies if the given article 14 on which the given tag 12 is linked to has been purchased (in accordance with the information in the database 20 ).
  • the processor 18 will allow the deactivation signal to be transmitted to the tag 12 thereby deactivating the tag 12 thus allowing the shopper to simply walk out of the store without any alarm being activated. If the processor 18 determines that the pre-condition of the article having been purchased has not been met, then the processor 18 will prevent for the deactivation signal to be transmitted to the tag 12 and thus the tag 12 will remain active so as to signal the alarm as the shopper walks past the reader.
  • the shopper merely puts each article 14 in their shopping cart; the tags 12 can talk to a networked system in the store which tracks the article 14 placed in the shopping cart.
  • the tags communicate with an electronic reader connected to a network that will send Information on the article 14 to the retailer and product manufacturers.
  • the shopper has an account that is notified in real time of the purchase (namely the placement of the article 14 in the shopping cart).
  • the account based on its payment capacity will accept or reject the purchase. Therefore, the purchase interface 21 comprises an electronic reader in the store that can track the position of the item 14 .
  • the shopper will then proceed to walk through an exit security reader as explained above.
  • the purchase interface 21 comprises a portable scanner that is used by the shopper to scan and bag articles 14 while shopping.
  • the scanner is brought to a self-checkout station, where the information from the scanner is downloaded.
  • the customer pays and receives a receipt at the self-checkout station.
  • the shopper will then proceed to walk through an exit security reader as explained above.
  • the processor 18 is configured to determine if an irregular amount of deactivation attempts have been made. If this is the case, the processor 18 can signal a warning from the output/input interface device 16 or from another alarm unit.
  • the processor 18 is configured to determine whether a time interval between a purchase and a deactivation command is within a regular predetermined time range. For example, if an irregular lapse of time has passed between a purchase and a deactivation request, the processor 18 may be configured to prevent the deactivation signal to be transmitted. Moreover, the processor 18 can provide for the interface device 16 to emit a warning signal (sound, light etc.) when a deactivation command is registered following a predetermined irregular time lapse from the purchase time.
  • a warning signal sound, light etc.
  • the processor 18 is configured to allow for a deactivation command to be emitted only in predetermined zones of the authorized delimited area.
  • An additional security measure is to include additional monitoring devices such as image capture devices, sensors, cameras, GPS devices, RFID devices etc. at these predetermined regions. The date and time of deactivation is logged and additionally it may be recorded. Therefore, deactivation activity can be verified against the recorded event.
  • the processor 18 can provide for the interface device 16 to emit a warning signal (sound, light etc.) when a deactivation request is registered in an unauthorized zone.
  • the processor 18 is configured to receive an identification code from the interface device 16 .
  • This identification code is an additional pre-condition for allowing the deactivation command to be emitted. As such, the employee must enter their identification into the interface device 16 and this Information is transmitted to the processor 18 .
  • the processor 18 can be configured to determine whether the given identification code entered has been entered within an authorized predetermined date and time. As such, the code of a given employee cannot be entered outside this employees working hours preventing fraudulent code entries.
  • An additional precondition is to provide for entering codes only in predetermined zones of the authorized delimited area. The processor 18 can thus determine if the coda is entered in the interface device 16 within these predetermined regions.
  • An additional security measure is to include cameras, GPS devices, RFID devices etc. at these predetermined zones.
  • the date and time of code entry is logged and additionally it may be recorded. Therefore, code entry activity can be verified against the recorded event.
  • the processor 18 can provide for the interface device to emit a warning signal (sound, light etc.) when entering a given code outside the authorized predetermined date and time or outside the predetermined regions.
  • the processor 18 can provide for activity reports regarding the foregoing and thus monitor unusual deactivation or attempted deactivation trends.
  • a plurality of processors 18 in respective areas can be in communication with a remote master processor 22 which can monitor deactivation activity in a given geographic region in which the plurality of processors 18 are positioned.
  • the processor 18 is configured to allow the deactivation signal to be transmitted at a predetermined distance range between the interface device 16 and the tag 12 . This adds a further security condition of forcing certain proximity between the user requesting the deactivation and the article 14 on which the tag 12 is linked.
  • the processor 18 is remote from the interface device 16 and in wireless communication therewith. In an embodiment, the processor 18 is in wireless communication with a plurality of interface devices 16 .
  • the processor 18 is configured to allow only one article 14 at a time to be deactivated by a given interface device 16 . This adds an additional level of security during checkout of multiple items.
  • the processor 18 is configured to allow the deactivation signal to be transmitted based on additional article information thus requiring an additional input device to provide the processor 18 with information such as the article weight etc. This is useful in self-checkout stations.
  • the processor 18 is in wired communication with the interface device 18 and therefore defines a modulating device.
  • the processor 18 is a computer.
  • the interface device 16 is a handheld unit.
  • the interface device 16 requires a code in order to effectuate a deactivation command.
  • the processor 18 is a micro-processor and is integral to the interface device 16 .
  • the communication between the tag 12 and the interface device 16 is by radiofrequency identification.
  • FIG. 2 An example of a handheld unit 24 comprising both the micro-processor 18 and the interface device 16 is shown in FIG. 2 and providing for selectively deactivating a tag 12 for example a RFID-EPC (Electronic Product Coded) tag 12 .
  • the handheld unit comprises an smartphone, an iPad, a tablet, and the like.
  • the handheld unit 24 communicates with a remote processor 18 by way of micro-processor or without the use of an internal micro-processor. Therefore, reference to micro-processor in the description below can refer to processor mutatis mutandis.
  • the devices of the disclosure combines the self-alarming tags 12 with RFID which comprising encoding to identify each article.
  • the present disclosure provides for capturing unauthorized removal of the security tag 12 or any activity (which is linked by an RFID to a particular article 14 ) on the sales floor and links it to employee activity since the handheld unit 24 simultaneously identifies the user and the article 14 . Therefore, the handheld unit 24 deactivates the tag 12 linked to a particular article 14 inside the package is identified as purchased in the database 20 (or any other additional validation status as described herein). If this precondition is not met, then the deactivation signal is not transmitted and tag 12 will continue to be active. As such, if anyone, including employees, tries to remove the self-alarming tag 12 , an alarm will be triggered.
  • the tag 12 is a self-alarming RFID-EPC (Electronic Product Coded) tag.
  • the triggered alarm can only be deactivated by authorized personnel such as management.
  • an alarm comprises an alert which is wirelessly and silently transmitted to receiving unit such as a pager to authorized personnel.
  • the article 14 in order for the handheld unit 24 to deactivate the tag 12 , the article 14 must comprise a “paid” status at the POS correlated with an acceptable predetermined time lapse between the purchase and the deactivation request.
  • the tag 12 contains a unique code/address for each article 14 .
  • the handheld unit 24 verifies if the encoded information on the tag 12 comprises a “paid” status for a given status. When a “paid” status is acknowledged the handheld unit 24 indicates same to the user (by way of a light for example) and deactivation is permitted. The user thus requests deactivation by a way of push button for example, and the tag 12 can be removed without triggering an alarm within a predetermined time interval such as 1-15 sec from deactivation.
  • the handheld unit 24 contains information regarding the purchase time of an article and thus the deactivation signal is only transmitted within a predetermined time interval from the purchase time ensuring that deactivation is at the POS.
  • the handheld unit 24 recognizes that another attempt is being made and prevents transmittal of a deactivation signal to the same tag 12 .
  • the second request can be authorized by an additional pass code entry known to authorized personnel.
  • the security level of the handheld unit 24 can be modulated and a low security setting can permit more than one attempt on all or specifically designated articles previously entered into its micro-processor 18 memory.
  • the activity log of the handheld unit 24 is kept in the micro-processor 18 memory would be kept and accessible for audit.
  • the micro-processor 18 does not allow the deactivation signal if the handheld unit 24 reads more than one tag 12 . Thereby, ensuring that the handheld unit 24 does not disarm more than one tag 12 .
  • the reading range of the handheld unit 24 is narrowed to a predetermined close proximity in order to avoid reading more than one tag 12 at the PUS for example, where the likelihood of having more than one item is high.
  • Cashiers may also keep items at a distance from each other during checkout to avoid the handheld unit 24 from reading more than item.
  • the handheld unit 24 can have a floor mode or a POS mode with the additional criteria mentioned herein for avoiding reading more than one tag 12 at a time.
  • the “proximity button” is enabled which reduces the read range and thus the target article will have to be scanned from a closer range in order to read the tag 12 for deactivation.
  • the various features described herein are fully integrated Into check-out scanners.
  • the foregoing provides for a multiple step process along proximity requirements for the enhanced security described above.
  • the deactivation signal is only allowed to be transmitted within the predetermined vicinity the target tag 12 , moreover the handheld unit 24 must simultaneously read identify the target tag 12 .
  • a greater reading range is provided to the handheld unit 24 in order to read a tag 12 positioned inside a package. Initially, the handheld unit 24 identifies the tag. If the proper target tag 12 has been identified (EPC code etc.), the employee can deactivate the tag 12 by making a request in accordance with a predetermined protocol.
  • the handheld unit 12 may include a retry control.
  • the retry control is submitted to a protocol.
  • the protocol includes validation by authorized personnel (manager etc.).
  • authorized personnel manager etc.
  • the foregoing may be undesirable in certain cases such as at the shipping/receiving department, moreover, other security measures are present at the POS (e.g. video overlay, analytics etc.), the foregoing validation feature can be disabled by authorized personnel. As such, the authorized personnel can enter their code and request that the feature be disabled or overridden.
  • the micro-processor 18 transmits all activity to the master processor 22 which provides for detailed activity reports.
  • the handheld unit 24 if the handheld unit 24 reads a tag 12 which already had a deactivation attempt by another user (regardless of the device used) it will not permit another attempt. Thus the handheld unit 24 registers on the EPC that there was a previous deactivation attempt.
  • the micro-processor 18 can be programmed to allow a predetermined amount of deactivation attempts. In cases, where deactivation is no longer possible due to a previous attempt, the intervention of authorized personnel with specific code access would be required for the deactivation signal to be allowed to be transmitted.
  • the certain articles or categories of articles may be blocked from deactivation by the micro-processor 18 .
  • Other preconditions include to prevent multiple deactivations of the same handheld unit 24 within given time frame for a certain category of employees (e.g. floor employees) and/or restrict the number of deactivations, and/or restrict certain articles from being deactivated by a particular user.
  • a certain category of employees e.g. floor employees
  • a tag 12 comprises predetermined acceptable codes which when accepted by the handheld unit 24 deactivate the tag 12 and prevent emission of an alarm signal.
  • a given tag 12 with such an acceptable code has to be cleared by the unit 24 .
  • Employees can scan the articles that will receive clearance and register them in the micro-processor memory and then get approval for clearing articles from authorized personnel by having the latter enter a user code (pass-code, fingerprint biometric scanner etc.) and then select each article one by one via the unit 24 interface or the interface of another processor linked to the unit 24 .
  • the authorized personnel can scroll up and down the different EPC codes using he visual display of the interface which indicates which articles have been cleared.
  • the authorized personnel can confirm a cleared article or remove an article erroneously cleared.
  • a network system e.g. master processor 22 communicates via cradle, cable or wireless to the handheld unit 24 any articles which are cleared for self-alarming tag removal.
  • the master processor 22 provides for providing exception reports and monitoring correlations as is understood in the art.
  • the tag 12 is encoded at the manufacture or anywhere along the supply chain before it arrives at the store and is removed at the POS.
  • UPC Universal Product Code
  • the handheld unit 24 could also be used to deactivate only if it recognizes a valid bar-code. Thus deactivation would only occur when a bar-code is scanned.
  • the handheld unit 24 comprises is automatically locked at predetermined times and dates avoiding unauthorized access (such as outside store hours etc.).
  • the handheld unit 24 comprises a “die” feature in order to automatically “log off” at a certain time of the day and it will require authorized personnel for reactivation.
  • the handheld unit 24 comprises a control interface such as a keypad, fingerprint biometric technology etc.
  • the handheld unit 24 may be provided with a delay mode that provides for temporarily deactivating the alarm for a limited amount of time.
  • the handheld unit 24 is provided with a pre-programmed forced deactivation feature allowing a user to deactivate the alarm before or after the aforementioned delay mode stated above.
  • the handheld unit 24 includes a port for downloading the memory (activity log etc.) via wire to another processor.
  • the handheld unit 24 communicates with revolving wireless and encrypted codes or any other secure wireless technology as known in the art.
  • the alarm and/or signals discussed herein could also be sent wirelessly to a pager set, receiver device, communicated using Bluetooth or wi-fi to send email or text notifications and any other wireless transmission to signal an alert as is known in the art.
  • the self-alarm tag comprises a memory for logging activity (last linked EPC, alarm times, de-activation and re-activation times, EPC not linked, change low battery, etc.) which would be helpful during investigations if the tag is found after being attacked by thieves or during audits.
  • NFC emitters placed around public places provide for encoding delimited areas which include articles with the self-alarming tags 12 .
  • the deactivation signal can be selectively modified to prevent defeating the devices, kits, methods and systems herein.

Abstract

Modulating the activation of an anti-theft self-alarming tag linked to an article is provided by a input/output interface In communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user. A processor is in communication the input/output interface for control thereof. The processor is in communication with a database comprising information on whether the article has been purchased or not for receiving purchase information therefrom. The processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application claims priority on U.S. patent application Ser. No. 61/983,383 filed on Apr. 23, 2014 and incorporated herein in its entirety.
  • TECHNICAL FIELD
  • The present disclosure generally relates to security tags. More particularly, but not exclusively, the present disclosure relates to methods, devices, kits and systems for modulating activation of self-alarming tags.
  • BACKGROUND
  • Employee theft is a significant problem in the retail industry. Most security devices target shoplifting customers and are put into the hands of employees for safekeeping. As such, employees have the ability to easily remove or by-pass security tags. Furthermore, most devices are mechanical (magnetic detachers and/or keys) which offer no ability to track and trace employee activity.
  • OBJECTS
  • An object of the present disclosure is to provide a system for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a device for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a kit for modulating activation of self-alarming tags.
  • An object of the present disclosure is to provide a method for modulating activation of self-alarming tags.
  • SUMMARY
  • In accordance with an aspect of the disclosure, there is provided a system for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, the system comprising: at least one database comprising information on whether a given one or more of the plurality of articles has been purchased or not; at least one input/output interface in communication with at least one of the plurality of self-alarming tags for transmitting a deactivation signal to the given one given self-alarming tag for deactivation thereof upon the request of a user; at least one processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the given self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the given one self-alarming tag if the article linked therewith has not been purchased.
  • In an embodiment of the system, the at least one processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In accordance with an aspect of the disclosure, there is provided a system for modulating the activation of a plurality of anti-theft self-alarming tag mounted to respective articles, each self-alarming tag signaling an alarm indicative of an unauthorized distance between each tag and the respective article it is mounted to, the system comprising: at least one database comprising information on whether a given one or more of the plurality of articles has been purchased or not; at least one input/output interface in wireless radiofrequency communication with at least one of the plurality of self-alarming tags for transmitting a deactivation signal to the given one given self-alarming tag for deactivation thereof upon the request of a user; at least one processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the given self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the given one self-alarming tag if the article linked therewith has not been purchased, and wherein the at least one processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In an embodiment, at least one the plurality of the tags is selected from the group consisting of an RFID tag, an RFID-EPC tag, an EAS tag, a smart label, an intelligent bar code and any combination thereof.
  • In an embodiment, the system further comprises a purchase interface for effectuating purchase of the article.
  • In an embodiment, the system further comprises a device for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, wherein the device comprises a element selected from the group consisting of the input/output interface, the processor, the database, the purchase interface and any combination thereof. In an embodiment, the device comprises a handheld unit.
  • In an embodiment, the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
  • In an embodiment, the system further comprises additional monitoring devices at predetermined regions within a purchasing area, in an embodiment, the additional monitoring devices are selected from the group consisting of: image capture devices, sensors, cameras, GPS devices, RFID devices and any combination thereof.
  • In an embodiment, the system further comprises a plurality of processors and a master processor in communication with the plurality of processors for receiving activity information therefrom, the master processor configured to analyze the activity information.
  • In accordance with an aspect of the disclosure, there is provided a device for modulating the activation of an anti-theft self-alarming tag linked to an article, the device comprising: a database comprising information on whether the article has been purchased or not; an input/output interface In communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • In an embodiment of the device, the processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In accordance with an aspect of the disclosure, there is provided a device for modulating the activation of an anti-theft self-alarming tag mounted to an article, the self-alarming tag signaling an alarm indicative of an unauthorized distance between the tag and the article, the device comprising: a database comprising information on whether the article has been purchased or not; an input/output interface in wireless radiofrequency communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased, wherein the processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined time range for the purchase to occur; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In an embodiment, the device further comprises a purchase interface for effectuating purchase of the article.
  • In an embodiment, the device comprises a handheld unit.
  • In an embodiment, the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
  • In accordance with an aspect of the disclosure, there is provided a kit for retail theft prevention comprising at least one self-alarming tag for being linked to an article for signaling an alarm in the case of attempted theft of the article; a database comprising information on whether the article has been purchased or not; at least one input/output interface in communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • In an embodiment of the kit, the processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In accordance with an aspect of the disclosure, there is provided a kit for retail theft prevention comprising: at least one self-alarming tag for being mounted to an article for signaling an alarm in the case of attempted theft of the article, the self-alarming tag signaling an alarm indicative of an unauthorized distance between the tag and the article; a database comprising information on whether the article has been purchased or not: at least one input/output interface In wireless radiofrequency communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; a processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof, wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased, and wherein the processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output Interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In an embodiment, the kit further comprises a purchase interface for effectuating purchase of the article,
  • In an embodiment, the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
  • In accordance with an aspect of the disclosure, there is provided a method for modulating the activation of a plurality of anti-theft self-alarming tags mounted to respective articles each self-alarming tag signaling an alarm indicative of an unauthorized distance between each tag and the respective article it is mounted to, the method comprising: remotely storing in real time information on whether the article has been purchased or not; remotely transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user, remotely allowing the transmission of the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and remotely allowing the transmission of the deactivation signal to the self-alarming tag based on a set of additional conditions selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing; remotely preventing the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • In accordance with an aspect of the disclosure, there is provided a method for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, the method comprising: remotely storing in real time information on whether the article has been purchased or not; remotely transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user; remotely allowing the transmission of the deactivation signal to the self-alarming tag if the article linked therewith has been purchased; and remotely preventing the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
  • In an embodiment, the method further comprises allowing the transmission of the deactivation signal to the self-alarming tag based on a set of additional conditions selected from the group consisting of: a predetermined time lapse between the purchase time of the article and the request of a user; a predetermined location of the self-alarming tag and the article; a predetermined location of the input/output interface; a predetermined distance between the input/output interface and the self-alarming tag; an identification code entry of the user prior to the request; and any combination of the foregoing.
  • In an embodiment, there is provided an internal control system which deters employees from stealing merchandise from their own employers.
  • The term “package” or “packaging” also includes without limitation whatsoever to the broad definition thereof a box of any type of configuration or any other type of full or partial enclosure for housing, enclosing or otherwise mounting an item therein or thereto as is known in the art made by any type of material.
  • The term “article(s)” also includes package, packages, and items depending on the use of a particular device, or assembly of devices disclosed herein.
  • Other objects, advantages and features of the present disclosure will become more apparent upon reading of the following non-restrictive description of illustrative embodiments thereof, given by way of example only with reference to the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the appended drawings:
  • FIG. 1 is a schematic representation of a system of for modulating activation of security tags in accordance with a non-restrictive illustrative embodiment of the present disclosure.
  • FIG. 2 is a perspective view of a handheld device for modulating activation of security tags in accordance with a non-restrictive illustrative embodiment of the present disclosure.
  • DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
  • Generally stated and in accordance with a non-limiting illustrative embodiment, there is provided devices, kits, methods and systems for modulating the activation of an anti-theft self-alarming tag linked to an article by way of a input/output interface in communication with the self-alarming tag for transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user. A processor is in communication the input/output interface for control thereof. The processor is in communication with a database comprising information on whether the article has been purchased or not for receiving purchase information therefrom. The processor is configured to allow the input/output interface to transmit the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased
  • With reference, to the appended Figure, non-restrictive illustrative embodiments will be herein described so as to further exemplify the disclosure only and by no means limit the scope thereof.
  • FIG. 1 shows a system 10 in accordance with an illustrative embodiment of the present disclosure. The system 10 includes a self-alarming tag 12 (RFID, EAS tag, smart labels, intelligent bar codes etc.) in communication with an article 14 (item, product package, etc.). As such, the article 14 cannot be removed from an authorized delimited area (store, checkout area etc.) unless the tag 12 is deactivated otherwise, if the article 14 is removed from the authorized delimited area, the activated tag 12 will trigger an alarm. Moreover, the tag 12 can also trigger an alarm when it is removed prior to be being deactivated.
  • The tags of the present disclosure comprise the various devices discussed in PCT/CA2012/000509 and in PCT/CA2014/000124 which are incorporated herein by reference in their entirety.
  • An input/output interface device 16 is in communication with the tag 12 for deactivating the tag 12 subsequent to purchase so as not to trigger an alarm when the customer leaves the authorized delimited area with the purchased article 14 or when the employee at the point of sale (such as the checkout), for example, removes the tag 12 from the purchased article 14.
  • The interface device 16 is in communication with a processor 18. The processor 18 controls the interface device 16 in deactivating the tag 12.
  • It is understood herein that the term “processor” includes without limitation a processing unit, a computing device, an integrated circuit, a central processing unit, a microprocessor, and the like and comprises an associated memory with an instruction set specific to its application.
  • The processor 18 is configured to identify the tag 12 and verify whether or not the article 14 to which the tag 12 is linked has been purchased. The processor 18 is thus in communication with a database 20 which receives purchasing Information via a purchasing or purchase interface 21 such a cash register, a checkout, a self-checkout (self-service checkout, or a semi attended customer activated terminal) or point of sale device as is known in the art.
  • As such, when the user requests (by way of a push button for example) the input/output interface device 16 to deactivate the tag 12, this request is communicated to the processor 18. The processor 18 verifies If the given article 14 on which the given tag 12 is linked to has been purchased (in accordance with the information in the database 20). If this pre-condition is met and the article 14 has indeed been purchased, then the processor 18 will allow the deactivation signal to be transmitted to the tag 12 thereby deactivating the tag 12. Alternatively, if the processor 18 determines that the pre-condition of the article having been purchased has not been met, then the processor 18 will prevent for the deactivation signal to be transmitted to the tag 12 and thus the tag 12 will remain active so as to signal the alarm as discussed hereinabove.
  • The point of sale devices include various other forms of personalized shopping devices and methods (e.g. IPay™) through smart phones or tablets (e.g. iPad™) or the like, where shoppers can purchase an item through their own personal device (i.e. the purchase interface 21).
  • In an embodiment, the shopper walks through the store chooses an article and merely purchases the article on site via their personal purchase interface 21, As they proceed to exit the store, the tag 12 is read by an exit security reader which comprises the input/output interface 16. Walking through this exit security reader (comprising the input/output interface 16) is in essence a request to the input/output interface device 16 to deactivate the tag 12, this request is communicated to the processor 18. Therefore, proceeding to exit the premises via the exit security reader is akin to a user actuating a deactivation command (as explained above). As before, the processor 18 verifies if the given article 14 on which the given tag 12 is linked to has been purchased (in accordance with the information in the database 20). If this pre-condition is met and the article 14 has indeed been purchased, then the processor 18 will allow the deactivation signal to be transmitted to the tag 12 thereby deactivating the tag 12 thus allowing the shopper to simply walk out of the store without any alarm being activated. If the processor 18 determines that the pre-condition of the article having been purchased has not been met, then the processor 18 will prevent for the deactivation signal to be transmitted to the tag 12 and thus the tag 12 will remain active so as to signal the alarm as the shopper walks past the reader.
  • In another embodiment, the shopper merely puts each article 14 in their shopping cart; the tags 12 can talk to a networked system in the store which tracks the article 14 placed in the shopping cart. For example, the tags communicate with an electronic reader connected to a network that will send Information on the article 14 to the retailer and product manufacturers. The shopper has an account that is notified in real time of the purchase (namely the placement of the article 14 in the shopping cart). The account based on its payment capacity will accept or reject the purchase. Therefore, the purchase interface 21 comprises an electronic reader in the store that can track the position of the item 14. The shopper will then proceed to walk through an exit security reader as explained above.
  • In another embodiment, the purchase interface 21 comprises a portable scanner that is used by the shopper to scan and bag articles 14 while shopping. When the shopper has finished shopping, the scanner is brought to a self-checkout station, where the information from the scanner is downloaded. The customer pays and receives a receipt at the self-checkout station. The shopper will then proceed to walk through an exit security reader as explained above.
  • In an embodiment, the processor 18 is configured to determine if an irregular amount of deactivation attempts have been made. If this is the case, the processor 18 can signal a warning from the output/input interface device 16 or from another alarm unit.
  • In an embodiment, the processor 18 is configured to determine whether a time interval between a purchase and a deactivation command is within a regular predetermined time range. For example, if an irregular lapse of time has passed between a purchase and a deactivation request, the processor 18 may be configured to prevent the deactivation signal to be transmitted. Moreover, the processor 18 can provide for the interface device 16 to emit a warning signal (sound, light etc.) when a deactivation command is registered following a predetermined irregular time lapse from the purchase time.
  • In an embodiment, the processor 18 is configured to allow for a deactivation command to be emitted only in predetermined zones of the authorized delimited area. An additional security measure is to include additional monitoring devices such as image capture devices, sensors, cameras, GPS devices, RFID devices etc. at these predetermined regions. The date and time of deactivation is logged and additionally it may be recorded. Therefore, deactivation activity can be verified against the recorded event. Moreover, the processor 18 can provide for the interface device 16 to emit a warning signal (sound, light etc.) when a deactivation request is registered in an unauthorized zone.
  • In an embodiment, the processor 18 is configured to receive an identification code from the interface device 16. This identification code is an additional pre-condition for allowing the deactivation command to be emitted. As such, the employee must enter their identification into the interface device 16 and this Information is transmitted to the processor 18. The processor 18 can be configured to determine whether the given identification code entered has been entered within an authorized predetermined date and time. As such, the code of a given employee cannot be entered outside this employees working hours preventing fraudulent code entries. An additional precondition is to provide for entering codes only in predetermined zones of the authorized delimited area. The processor 18 can thus determine if the coda is entered in the interface device 16 within these predetermined regions. An additional security measure is to include cameras, GPS devices, RFID devices etc. at these predetermined zones. The date and time of code entry is logged and additionally it may be recorded. Therefore, code entry activity can be verified against the recorded event. Moreover, the processor 18 can provide for the interface device to emit a warning signal (sound, light etc.) when entering a given code outside the authorized predetermined date and time or outside the predetermined regions.
  • The processor 18 can provide for activity reports regarding the foregoing and thus monitor unusual deactivation or attempted deactivation trends.
  • A plurality of processors 18 in respective areas (stores etc.) can be in communication with a remote master processor 22 which can monitor deactivation activity in a given geographic region in which the plurality of processors 18 are positioned.
  • In an embodiment, the processor 18 is configured to allow the deactivation signal to be transmitted at a predetermined distance range between the interface device 16 and the tag 12. This adds a further security condition of forcing certain proximity between the user requesting the deactivation and the article 14 on which the tag 12 is linked.
  • In an embodiment, the processor 18 is remote from the interface device 16 and in wireless communication therewith. In an embodiment, the processor 18 is in wireless communication with a plurality of interface devices 16.
  • In an embodiment, the processor 18 is configured to allow only one article 14 at a time to be deactivated by a given interface device 16. This adds an additional level of security during checkout of multiple items.
  • In an embodiment, the processor 18 is configured to allow the deactivation signal to be transmitted based on additional article information thus requiring an additional input device to provide the processor 18 with information such as the article weight etc. This is useful in self-checkout stations.
  • In an embodiment, the processor 18 is in wired communication with the interface device 18 and therefore defines a modulating device.
  • In an embodiment, the processor 18 is a computer.
  • In an embodiment, the interface device 16 is a handheld unit.
  • In an embodiment, the interface device 16 requires a code in order to effectuate a deactivation command.
  • In an embodiment the processor 18 is a micro-processor and is integral to the interface device 16.
  • In an embodiment, the communication between the tag 12 and the interface device 16 is by radiofrequency identification.
  • An example of a handheld unit 24 comprising both the micro-processor 18 and the interface device 16 is shown in FIG. 2 and providing for selectively deactivating a tag 12 for example a RFID-EPC (Electronic Product Coded) tag 12. In an embodiment, the handheld unit comprises an smartphone, an iPad, a tablet, and the like.
  • In another embodiment, the handheld unit 24 communicates with a remote processor 18 by way of micro-processor or without the use of an internal micro-processor. Therefore, reference to micro-processor in the description below can refer to processor mutatis mutandis.
  • In an embodiment, the devices of the disclosure combines the self-alarming tags 12 with RFID which comprising encoding to identify each article.
  • Conventional devices deactivate tags only after a valid transaction at the POS. The present disclosure provides for capturing unauthorized removal of the security tag 12 or any activity (which is linked by an RFID to a particular article 14) on the sales floor and links it to employee activity since the handheld unit 24 simultaneously identifies the user and the article 14. Therefore, the handheld unit 24 deactivates the tag 12 linked to a particular article 14 inside the package is identified as purchased in the database 20 (or any other additional validation status as described herein). If this precondition is not met, then the deactivation signal is not transmitted and tag 12 will continue to be active. As such, if anyone, including employees, tries to remove the self-alarming tag 12, an alarm will be triggered. In an embodiment, the tag 12 is a self-alarming RFID-EPC (Electronic Product Coded) tag. In an embodiment, the triggered alarm can only be deactivated by authorized personnel such as management.
  • In an embodiment, an alarm comprises an alert which is wirelessly and silently transmitted to receiving unit such as a pager to authorized personnel.
  • In an embodiment, in order for the handheld unit 24 to deactivate the tag 12, the article 14 must comprise a “paid” status at the POS correlated with an acceptable predetermined time lapse between the purchase and the deactivation request.
  • The tag 12 contains a unique code/address for each article 14. The handheld unit 24 verifies if the encoded information on the tag 12 comprises a “paid” status for a given status. When a “paid” status is acknowledged the handheld unit 24 indicates same to the user (by way of a light for example) and deactivation is permitted. The user thus requests deactivation by a way of push button for example, and the tag 12 can be removed without triggering an alarm within a predetermined time interval such as 1-15 sec from deactivation. Moreover, the handheld unit 24 contains information regarding the purchase time of an article and thus the deactivation signal is only transmitted within a predetermined time interval from the purchase time ensuring that deactivation is at the POS.
  • In the case where an employee fails to remove the self-alarming tag 12 after a deactivation request and makes a second deactivation request, the handheld unit 24 recognizes that another attempt is being made and prevents transmittal of a deactivation signal to the same tag 12. The second request can be authorized by an additional pass code entry known to authorized personnel.
  • The security level of the handheld unit 24 can be modulated and a low security setting can permit more than one attempt on all or specifically designated articles previously entered into its micro-processor 18 memory.
  • The activity log of the handheld unit 24 is kept in the micro-processor 18 memory would be kept and accessible for audit.
  • In an embodiment, the micro-processor 18 does not allow the deactivation signal if the handheld unit 24 reads more than one tag 12. Thereby, ensuring that the handheld unit 24 does not disarm more than one tag 12.
  • In an embodiment, the reading range of the handheld unit 24 is narrowed to a predetermined close proximity in order to avoid reading more than one tag 12 at the PUS for example, where the likelihood of having more than one item is high. Cashiers may also keep items at a distance from each other during checkout to avoid the handheld unit 24 from reading more than item.
  • In an embodiment, the handheld unit 24 can have a floor mode or a POS mode with the additional criteria mentioned herein for avoiding reading more than one tag 12 at a time.
  • It may be desired even on the sales floor to remove the self-alarming tag 12 without having to move other articles away from the target article. In this case the “proximity button” is enabled which reduces the read range and thus the target article will have to be scanned from a closer range in order to read the tag 12 for deactivation.
  • In an embodiment, the various features described herein are fully integrated Into check-out scanners. The foregoing provides for a multiple step process along proximity requirements for the enhanced security described above.
  • In an embodiment, in order to avoid deactivation of other self-alarming tags 12 on the floor, the deactivation signal is only allowed to be transmitted within the predetermined vicinity the target tag 12, moreover the handheld unit 24 must simultaneously read identify the target tag 12. In an embodiment, a greater reading range is provided to the handheld unit 24 in order to read a tag 12 positioned inside a package. Initially, the handheld unit 24 identifies the tag. If the proper target tag 12 has been identified (EPC code etc.), the employee can deactivate the tag 12 by making a request in accordance with a predetermined protocol. During such an operation, if more than one tag 12 is read with an unpaid status and/or the wrong identification code is read with an unpaid status, the micro-processor 18 will not allow transmission of a deactivation signal. As such, the articles may need to be moved away from one another for a proper reading of the target tag 12. For such cases, the handheld unit 12, in an embodiment, may include a retry control. In an embodiment, the retry control is submitted to a protocol. In an embodiment, the protocol includes validation by authorized personnel (manager etc.). Of course, the foregoing may be undesirable in certain cases such as at the shipping/receiving department, moreover, other security measures are present at the POS (e.g. video overlay, analytics etc.), the foregoing validation feature can be disabled by authorized personnel. As such, the authorized personnel can enter their code and request that the feature be disabled or overridden. The micro-processor 18 transmits all activity to the master processor 22 which provides for detailed activity reports.
  • In an embodiment, if the handheld unit 24 reads a tag 12 which already had a deactivation attempt by another user (regardless of the device used) it will not permit another attempt. Thus the handheld unit 24 registers on the EPC that there was a previous deactivation attempt. The micro-processor 18 can be programmed to allow a predetermined amount of deactivation attempts. In cases, where deactivation is no longer possible due to a previous attempt, the intervention of authorized personnel with specific code access would be required for the deactivation signal to be allowed to be transmitted.
  • In one embodiment, the certain articles or categories of articles may be blocked from deactivation by the micro-processor 18.
  • Other preconditions include to prevent multiple deactivations of the same handheld unit 24 within given time frame for a certain category of employees (e.g. floor employees) and/or restrict the number of deactivations, and/or restrict certain articles from being deactivated by a particular user.
  • Of course, all user activity can be stored in the micro-processor 18 and transmitted to the master processor 22.
  • In an embodiment, a tag 12 comprises predetermined acceptable codes which when accepted by the handheld unit 24 deactivate the tag 12 and prevent emission of an alarm signal. In an embodiment, a given tag 12 with such an acceptable code has to be cleared by the unit 24. In one embodiment, Employees can scan the articles that will receive clearance and register them in the micro-processor memory and then get approval for clearing articles from authorized personnel by having the latter enter a user code (pass-code, fingerprint biometric scanner etc.) and then select each article one by one via the unit 24 interface or the interface of another processor linked to the unit 24. The authorized personnel can scroll up and down the different EPC codes using he visual display of the interface which indicates which articles have been cleared. The authorized personnel can confirm a cleared article or remove an article erroneously cleared.
  • In an embodiment, a network system (e.g. master processor 22) communicates via cradle, cable or wireless to the handheld unit 24 any articles which are cleared for self-alarming tag removal.
  • In an embodiment, the master processor 22 provides for providing exception reports and monitoring correlations as is understood in the art.
  • In an embodiment, the tag 12 is encoded at the manufacture or anywhere along the supply chain before it arrives at the store and is removed at the POS.
  • In an embodiment, UPC (Universal Product Code) information could also be converted and encoded onto the tag 12.
  • In an embodiment, the handheld unit 24 could also be used to deactivate only if it recognizes a valid bar-code. Thus deactivation would only occur when a bar-code is scanned.
  • In an embodiment, the handheld unit 24 comprises is automatically locked at predetermined times and dates avoiding unauthorized access (such as outside store hours etc.). In an embodiment, the handheld unit 24 comprises a “die” feature in order to automatically “log off” at a certain time of the day and it will require authorized personnel for reactivation.
  • In an embodiment, the handheld unit 24 comprises a control interface such as a keypad, fingerprint biometric technology etc.
  • In an embodiment, in order to avoid false alarms, the handheld unit 24 may be provided with a delay mode that provides for temporarily deactivating the alarm for a limited amount of time.
  • In an embodiment, the handheld unit 24 is provided with a pre-programmed forced deactivation feature allowing a user to deactivate the alarm before or after the aforementioned delay mode stated above.
  • In an embodiment, the handheld unit 24 includes a port for downloading the memory (activity log etc.) via wire to another processor.
  • In an embodiment, the handheld unit 24 communicates with revolving wireless and encrypted codes or any other secure wireless technology as known in the art.
  • The alarm and/or signals discussed herein could also be sent wirelessly to a pager set, receiver device, communicated using Bluetooth or wi-fi to send email or text notifications and any other wireless transmission to signal an alert as is known in the art.
  • In an embodiment, the self-alarm tag comprises a memory for logging activity (last linked EPC, alarm times, de-activation and re-activation times, EPC not linked, change low battery, etc.) which would be helpful during investigations if the tag is found after being attacked by thieves or during audits.
  • In an embodiment, NFC emitters placed around public places provide for encoding delimited areas which include articles with the self-alarming tags 12.
  • In an embodiment, the deactivation signal can be selectively modified to prevent defeating the devices, kits, methods and systems herein.
  • The various features described herein can be combined in a variety of ways within the context of the present disclosure so as to provide still other embodiments. As such, the embodiments are not mutually exclusive. Moreover, the embodiments discussed herein need not include all of the features and elements illustrated and/or described and thus partial combinations of features can also be contemplated. Furthermore, embodiments with less features than those described can also be contemplated.
  • It is to be understood that the present disclosure is not limited in its application to the details of construction and parts illustrated in the accompanying drawings and described hereinabove. The disclosure is capable of other embodiments and of being practiced in various ways. It is also to be understood that the phraseology or terminology used herein is for the purpose of description and not limitation.
  • Hence, although the present disclosure has been provided hereinabove by way of non-restrictive illustrative embodiments thereof, it can be modified, without departing from the scope, spirit and nature thereof and of the appended claims.

Claims (23)

1. A system for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, the system comprising:
at least one database comprising information on whether a given one or more of the plurality of articles has been purchased or not;
at least one input/output interface in communication with at least one of the plurality of self-alarming tags for transmitting a deactivation signal to the given one given self-alarming tag for deactivation thereof upon the request of a user;
at least one processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof,
wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the given self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the given one self-alarming tag if the article linked therewith has not been purchased.
2. A system according to claim 1, wherein the at least one processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of:
a predetermined time lapse between the purchase time of the article and the request of a user;
a predetermined location of the self-alarming tag and the article;
a predetermined location of the input/output interface;
a predetermined distance between the input/output interface and the self-alarming tag;
an identification code entry of the user prior to the request; and
any combination of the foregoing.
3. A system according to claim 1, wherein at least one the plurality of the tags is selected from the group consisting of an RFID tag, an RFID-EPC tag, an EAS tag, a smart label, an intelligent bar code and any combination thereof.
4. A system according to claim 1, further comprising a purchase interface for effectuating purchase of the article.
5. A system according to claim 1, further comprising a device for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, wherein the device comprises a element selected from the group consisting of the input/output interface, the processor, the database, the purchase interface and any combination thereof.
6. A system according to claim 5, wherein the device comprises a handheld unit.
7. A system according to claim 1, wherein the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
8. A system according to claim 1, further comprising additional monitoring devices at predetermined regions within a purchasing area.
9. A system according to claim 8, wherein the additional monitoring devices are selected from the group consisting of: image capture devices, sensors, cameras, GPS devices, RFID devices and any combination thereof.
10. A system according to claim 1, further comprising a plurality of processors and a master processor in communication with the plurality of processors for receiving activity information therefrom, the master processor configured to analyze the activity information.
11. A system for modulating the activation of a plurality of anti-theft self-alarming tags mounted to respective articles, each self-alarming tag signaling an alarm indicative of an unauthorized distance between each tag and the respective article it is mounted to, the system comprising:
at least one database comprising information on whether a given one or more of the plurality of articles has been purchased or not;
at least one input/output interface in wireless radiofrequency communication with at least one of the plurality of self-alarming tags for transmitting a deactivation signal to the given one given self-alarming tag for deactivation thereof upon the request of a user;
at least one processor in communication with the database for receiving purchase information therefrom and with the input/output interface for control threreof,
wherein the processor is configured to allow the input/output interface to transmit the deactivation signal to the given self-alarming tag if the article linked therewith has been purchased and to prevent the input/output interface from transmitting the deactivation signal to the given one self-alarming tag if the article linked therewith has not been purchased, and
wherein the at least one processor comprises a set of additional conditions for allowing the input/output device to transmit the deactivation signal to the self-alarming tag, selected from the group consisting of:
a predetermined time lapse between the purchase time of the article and the request of a user;
a predetermined location of the self-alarming tag and the article;
a predetermined location of the input/output interface;
a predetermined distance between the input/output interface and the self-alarming tag;
an identification code entry of the user prior to the request; and
any combination of the foregoing.
12. A system according to claim 11, wherein at least one the plurality of the tags is selected from the group consisting of an RFID tag, an RFID-EPC tag, an EAS tag, a smart label, an intelligent bar code and any combination thereof.
13. A system according to claim 11, further comprising a purchase interface for effectuating purchase of the article.
14. A system according to claim 11, further comprising a device for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, wherein the device comprises a element selected from the group consisting of the input/output interface, the processor, the database, the purchase interface and any combination thereof.
15. A system according to claim 14, wherein the device comprises a handheld unit.
16. A system according to claim 11, wherein the processor communicates with an alarm-signaling device to signal an alarm if a predetermined irregular amount of deactivation requests have been made.
17. A system according to claim 11, further comprising additional monitoring devices at predetermined regions within a purchasing area.
18. A system according to claim 17, wherein the additional monitoring devices are selected from the group consisting of: image capture devices, sensors, cameras, GPS devices, RFID devices and any combination thereof.
19. A system according to claim 11, further comprising a plurality of processors and a master processor in communication with the plurality of processors for receiving activity information therefrom, the master processor configured to analyze the activity information.
20-35. (canceled)
36. A method for modulating the activation of a plurality of anti-theft self-alarming tags linked to respective articles, the method comprising:
remotely storing in real time information on whether the article has been purchased or not;
remotely transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user;
remotely allowing the transmission of the deactivation signal to the self-alarming tag if the article linked therewith has been purchased; and
remotely preventing the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
37. A method according to claim 36, further comprising allowing the transmission of the deactivation signal to the self-alarming tag based on a set of additional conditions selected from the group consisting of:
a predetermined time lapse between the purchase time of the article and the request of a user;
a predetermined location of the self-alarming tag and the article;
a predetermined location of the input/output interface;
a predetermined distance between the input/output interface and the self-alarming tag;
an identification code entry of the user prior to the request; and
any combination of the foregoing.
38. A method for modulating the activation of a plurality of anti-theft self-alarming tags mounted to respective articles, each self-alarming tag signaling an alarm indicative of an unauthorized distance between each tag and the respective article it is mounted to, the method comprising:
remotely storing in real time information on whether the article has been purchased or not;
remotely transmitting a deactivation signal to the self-alarming tag for deactivation thereof upon the request of a user;
remotely allowing the transmission of the deactivation signal to the self-alarming tag if the article linked therewith has been purchased and remotely allowing the transmission of the deactivation signal to the self-alarming tag based on a set of additional conditions selected from the group consisting of:
a predetermined time lapse between the purchase time of the article and the request of a user;
a predetermined location of the self-alarming tag and the article;
a predetermined location of the input/output interface;
a predetermined distance between the input/output interface and the self-alarming tag;
an identification code entry of the user prior to the request; and
any combination of the foregoing;
remotely preventing the input/output interface from transmitting the deactivation signal to the self-alarming tag if the article linked therewith has not been purchased.
US15/306,407 2014-04-23 2015-04-23 Methods, devices, kits and systems for modulating activation of self-alarming tags Active US9947194B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/306,407 US9947194B2 (en) 2014-04-23 2015-04-23 Methods, devices, kits and systems for modulating activation of self-alarming tags

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201461983383P 2014-04-23 2014-04-23
PCT/CA2015/000267 WO2015161359A1 (en) 2014-04-23 2015-04-23 Methods, devices, kits and systems for modulating activation of self-alarming tags
US15/306,407 US9947194B2 (en) 2014-04-23 2015-04-23 Methods, devices, kits and systems for modulating activation of self-alarming tags

Publications (2)

Publication Number Publication Date
US20170046932A1 true US20170046932A1 (en) 2017-02-16
US9947194B2 US9947194B2 (en) 2018-04-17

Family

ID=54331519

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/306,407 Active US9947194B2 (en) 2014-04-23 2015-04-23 Methods, devices, kits and systems for modulating activation of self-alarming tags

Country Status (7)

Country Link
US (1) US9947194B2 (en)
EP (1) EP3134882B1 (en)
CN (1) CN106463035B (en)
CA (1) CA2983621A1 (en)
ES (1) ES2767403T3 (en)
PL (1) PL3134882T3 (en)
WO (1) WO2015161359A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170186294A1 (en) * 2015-12-25 2017-06-29 Toshiba Tec Kabushiki Kaisha Register system that deactivates a security tag attached to a product
ES2719742A1 (en) * 2018-01-08 2019-07-12 Wearable Tech S L Comprehensive purchase system using mobile devices in physical commerce through near field communications (Machine-translation by Google Translate, not legally binding)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3909031B1 (en) * 2019-01-10 2023-10-18 Sensormatic Electronics LLC Systems and methods for using radio frequency identification as an adaptive alarm threshold
US10977612B2 (en) * 2019-04-02 2021-04-13 Coupang, Corp. Electronic inventory tracking system and associated user interfaces

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6169483B1 (en) * 1999-05-04 2001-01-02 Sensormatic Electronics Corporation Self-checkout/self-check-in RFID and electronics article surveillance system
US20050190060A1 (en) * 2004-02-20 2005-09-01 Checkpoint Systems International Gmbh System and method for authenticated detachment of product tags
US20060016885A1 (en) * 2004-07-23 2006-01-26 Checkpoint Systems, Inc. Self-check system and method for protecting digital media
US20090045955A1 (en) * 2007-08-13 2009-02-19 Wal-Mart Stores, Inc. Rfid theft prevention system
US20100198706A1 (en) * 2006-06-30 2010-08-05 International Business Machines Corporation Security System for Inventory
US20100300159A1 (en) * 2009-05-22 2010-12-02 Proteqt Technologies, Inc. Remote-activation lock system and method
US20140125800A1 (en) * 2012-11-02 2014-05-08 Sensormatic Electronics, LLC Electronic article surveillance tagged item validation prior to deactivation
US20150009035A1 (en) * 2012-11-02 2015-01-08 Paul B. Rasband Systems and methods for customer deactivation of security elements
US20150029027A1 (en) * 2011-12-23 2015-01-29 Yudigar S.L.U. Uncoupling device and method
US9443407B2 (en) * 2012-06-18 2016-09-13 Rfid Resolution Team, Inc. Electronic article surveillance using radio frequency identification

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6025780A (en) * 1997-07-25 2000-02-15 Checkpoint Systems, Inc. RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
US8508367B2 (en) * 2009-09-21 2013-08-13 Checkpoint Systems, Inc. Configurable monitoring device
MX2012003457A (en) * 2009-09-21 2012-08-03 Checkpoint Systems Inc Retail product tracking system, method, and apparatus.
US8976030B2 (en) * 2012-04-24 2015-03-10 Metrologic Instruments, Inc. Point of sale (POS) based checkout system supporting a customer-transparent two-factor authentication process during product checkout operations

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6169483B1 (en) * 1999-05-04 2001-01-02 Sensormatic Electronics Corporation Self-checkout/self-check-in RFID and electronics article surveillance system
US20050190060A1 (en) * 2004-02-20 2005-09-01 Checkpoint Systems International Gmbh System and method for authenticated detachment of product tags
US20070188333A1 (en) * 2004-02-20 2007-08-16 Checkpoint Systems, Inc. System and Method for Authenticated Detachment of Product Tags
US20060016885A1 (en) * 2004-07-23 2006-01-26 Checkpoint Systems, Inc. Self-check system and method for protecting digital media
US20100198706A1 (en) * 2006-06-30 2010-08-05 International Business Machines Corporation Security System for Inventory
US20090045955A1 (en) * 2007-08-13 2009-02-19 Wal-Mart Stores, Inc. Rfid theft prevention system
US20100300159A1 (en) * 2009-05-22 2010-12-02 Proteqt Technologies, Inc. Remote-activation lock system and method
US20150029027A1 (en) * 2011-12-23 2015-01-29 Yudigar S.L.U. Uncoupling device and method
US9443407B2 (en) * 2012-06-18 2016-09-13 Rfid Resolution Team, Inc. Electronic article surveillance using radio frequency identification
US20140125800A1 (en) * 2012-11-02 2014-05-08 Sensormatic Electronics, LLC Electronic article surveillance tagged item validation prior to deactivation
US20150009035A1 (en) * 2012-11-02 2015-01-08 Paul B. Rasband Systems and methods for customer deactivation of security elements

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170186294A1 (en) * 2015-12-25 2017-06-29 Toshiba Tec Kabushiki Kaisha Register system that deactivates a security tag attached to a product
ES2719742A1 (en) * 2018-01-08 2019-07-12 Wearable Tech S L Comprehensive purchase system using mobile devices in physical commerce through near field communications (Machine-translation by Google Translate, not legally binding)

Also Published As

Publication number Publication date
US9947194B2 (en) 2018-04-17
EP3134882A4 (en) 2017-04-26
ES2767403T3 (en) 2020-06-17
PL3134882T3 (en) 2020-05-18
WO2015161359A1 (en) 2015-10-29
EP3134882A1 (en) 2017-03-01
CA2983621A1 (en) 2015-10-29
CN106463035B (en) 2020-04-21
CN106463035A (en) 2017-02-22
EP3134882B1 (en) 2019-10-09

Similar Documents

Publication Publication Date Title
US10522016B2 (en) Self-detaching anti-theft device for retail environment
US7920063B2 (en) RFID theft prevention system
US9171442B2 (en) Item identification using video recognition to supplement bar code or RFID information
US6681989B2 (en) Inventory control and point-of-sale system and method
US20170046707A1 (en) System and Method for Mobile Device Self-Checkout for Retail Transactions with Loss Protection
JP5114213B2 (en) Alarm investigation using RFID
EP1817758B1 (en) System and method for integrating point of sale and electronic article surveillance data
US7808388B2 (en) Security system for inventory
US7303128B2 (en) System and method for managing assets using a portable combined electronic article surveillance system and barcode scanner
CN104781857B (en) Mobile retail periphery platform for hand-held device
US6926202B2 (en) System and method of deterring theft of consumers using portable personal shopping solutions in a retail environment
US20140125800A1 (en) Electronic article surveillance tagged item validation prior to deactivation
US9947194B2 (en) Methods, devices, kits and systems for modulating activation of self-alarming tags
KR20160131000A (en) Systems and methods for customer deactivation of security elements
US20050134449A1 (en) Two stage radio frequency identification
WO2002009055A1 (en) Anti-theft device and method for use in products with electric or electronic components therein
WO2022190101A1 (en) System and methods for payment verification before exit
WO2022254424A1 (en) Self service removal of security tags
MXPA00000927A (en) Electrically, physically or virtually reactivating rfid tags

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4